The well-known, “flamboyant” founder of Megaupload, Kim Dotcom, has developed a new version of his file sharing service named Mega. This new site is designed primarily to make it nearly impossible for U.S. law enforcement officials to figure out what files are being shared that violate copyright protections.
If you haven’t heard of Kim Dotcom, maybe you have heard about the high-profile raid by U.S. law enforcement on his New Zealand mansion on January 19th of this year. Dotcom was arrested and is still awaiting trial facing extradition to the United States to face copyright theft charges. He was also forced to shut down his file sharing service Megaupload.
By not using any U.S. domains, U.S. providers or U.S. hosting services, as well as encrypting files shares on the site (keeping them secret from even the site’s administrators), Dotcom hopes his new Mega site will be able to avoid the long arm of the U.S. law. And because the U.S.’s legislation of the Internet applies only to its citizens, Dotcom might’ve just figured out how to avoid another arrest… for now.
What These Concerns Could Mean for You
Unauthorized file sharing websites are not a new phenomenon, since the beginning of the Internet people have been looking for ways to share files whether they are authorized for sharing or not. Though most unauthorized file sharing is done around movies, music, television, etc., the concerns with these types of sites should be shared by all types of businesses.
The ramifications could be massive when you start considering the possibility of your employees using unauthorized file sharing sites to share your own company’s sensitive information. And because Mega has been designed specifically to make it nearly impossible to figure out what information is being shared, you would have no way of being able to figure out where the sensitive data leak is happening.
What You Can Do to Avoid a Mega Disaster
- Block all unauthorized file sharing websites from your network
- Include your policy on unauthorized file sharing websites in your company’s internet policy
- Provide your employees with safe and secure file sharing solutions
The truth is, you can’t absolutely make sure that your employees aren’t using these sites to share sensitive files. However, you can control what happens on your business’s network. Make sure you are monitoring it and making sure your employees aren’t exposing your data or your business to unnecessary cyber and legal threats.